10
CVSSv2

CVE-2009-0323

Published: 28/01/2009 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote malicious users to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.

Vulnerable Product Search on Vulmon Subscribe to Product

w3 amaya

w3 amaya 9.55

w3 amaya 9.4

w3 amaya 8.8.4

w3 amaya 9.0

w3 amaya 8.7

w3 amaya 8.1a

w3 amaya 8.1

w3 amaya 6.2

w3 amaya 9.52

w3 amaya 8.52

w3 amaya 9.2.1

w3 amaya 9.1

w3 amaya 8.4

w3 amaya 8.3

w3 amaya 7.1

w3 amaya 7.0

w3 amaya 5.1

w3 amaya 5.0

w3 amaya 4.0

w3 amaya 3.2.1

w3 amaya 2.1

w3 amaya 2.0

w3 amaya 1.1c

w3 amaya 1.1

w3 amaya 10.0

w3 amaya 9.5

w3 amaya 8.8.5

w3 amaya 8.7.2

w3 amaya 8.7.1

w3 amaya 8.2

w3 amaya 8.1b

w3 amaya 6.4

w3 amaya 6.3

w3 amaya 4.3.2

w3 amaya 4.3.1

w3 amaya 3.2

w3 amaya 3.1

w3 amaya 1.4

w3 amaya 1.4a

w3 amaya 1.3b

w3 amaya 1.1a

w3 amaya 1.0

w3 amaya 6.1

w3 amaya 6.0

w3 amaya 4.3

w3 amaya 4.2.1

w3 amaya 3.0

w3 amaya 2.4

w3 amaya 1.3a

w3 amaya 1.3

w3 amaya 1.0a

w3 amaya 0.95b

w3 amaya 9.54

w3 amaya 9.53

w3 amaya 9.3

w3 amaya 8.8.3

w3 amaya 8.8.1

w3 amaya 8.6

w3 amaya 8.5

w3 amaya 8.0

w3 amaya 7.2

w3 amaya 5.3

w3 amaya 5.2

w3 amaya 4.2

w3 amaya 4.1

w3 amaya 2.3

w3 amaya 2.2

w3 amaya 1.2a

w3 amaya 1.2

w3 amaya 0.9

Exploits

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory wwwcoresecuritycom/corelabs/ Amaya web editor XML and HTML parser vulnerabilities 1 *Advisory Information* Title: Amaya web editor XML and HTML parser vulnerabilities Advisory ID: CORE-2008-1211 Advisory URL: wwwcore ...
## # $Id: amaya_bdorb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasp ...